Early-bird Discount
expires in
Register Now

Agenda

Digital ID Deep Dives

Digital ID Deep Dives

Session Stream V

In the intricate and expansive ecosystem of Digital ID and Cloud Security, having a surface-level understanding merely scratches the tip of the iceberg. The "Digital ID Deep Dives" session at EIC 2024 is dedicated to those seeking a profound, nuanced grasp of the critical topics and innovative trends that form the backbone of our digital future. This stream pulls back the layers, offering in-depth examinations, intricate discussions, and comprehensive insights into the very core of digital identity and its intertwined relationship with cloud security.

Deconstructing Identity Fabrics:

  • The Genesis: Explore the foundational principles, standards, and technologies driving the evolution of digital identity fabrics.
  • Interoperability & Integration: Delve into the challenges and strategies associated with ensuring seamless identity management across diverse platforms and ecosystems.

eIDAS 2 Deployment Challenges:

  • Navigating the Landscape: Understand the complexities and nuances of deploying eIDAS 2, Europe's regulatory framework for electronic identification and trust services.
  • Interoperability Hurdles: Delve into the challenges faced in ensuring cross-border and cross-sector compatibility.
  • Balancing Security and Usability: Tackle the perennial task of maintaining robust security without compromising user convenience and accessibility.

Extended Explorations from Other Streams:

  • Retrieval-Augmented Generation & Generative AI: An enriched understanding of their profound impact on secure application design and deployment in cloud environments.
  • Spatial Computing & Phygital Convergence: A detailed examination of their implications for digital ID management, user authentication, and data protection in blended realities.
  • Sustainable Security: Dive deeper into the nexus between green technology initiatives and their integration into cloud security frameworks.

Hands-On Workshops:

  • Practical Insights: Engage in interactive sessions, simulations, and workshops, translating theoretical knowledge into actionable strategies.
  • Expert-led Sessions: Benefit from the expertise of leading figures in the industry, offering insights, guidance, and answers to the most pressing questions.

Collaborative Conversations:

  • Roundtable Discussions: Join peers and experts in intensive dialogues, debating challenges, sharing experiences, and co-creating solutions.
  • Case Studies: Dive into real-world scenarios, understanding challenges, dissecting strategies, and extracting invaluable lessons.

The "Digital ID Deep Dives" session stream at EIC 2024 is a hands-on journey, a chance for attendees to immerse themselves fully, expanding their expertise and elevating their understanding of the intricate realms of digital identity and cloud security.


Digital ID & AI Deep Dives

AI Joins the Team I

June 05, 2024 11:00 - 11:20
Location: A 03-04
Control AI with Prompt Engineering
Have you ever wanted to control a powerful AI? Now you can, with prompt engineering! Prompt engineering is the art of using specific instructions, or prompts, to tell large language models (LLMs) what you want them to do. By carefully crafting prompts, you can direct LLMs to produce specific results, such as writing a poem, translating a document, or answering a complex question. In this talk, I will give you a behind-the-scenes look at how prompt engineering works. I will show you how to...

Alan Turing Institute, BPP University
June 05, 2024 11:20 - 11:40
Location: A 03-04
Data Strategy for Generative AI Applications — Why Your Data is the Differentiator
Generative AI is transforming industries. To realize its full potential, you need a modern data strategy. Join this session to learn how to develop an effective data strategy and build generative AI applications that deliver domain-specific experiences. We'll discuss data-centric architectural patterns that can help you accelerate your AI development, improve customer experience, and gain better business insights. We will also discover how to align your data and generative AI strategy with...

Amazon Web Services (AWS)
Amazon Web Services (AWS)
June 05, 2024 11:40 - 12:00
Location: A 03-04
Creating Human-Readable Activity Summary from Millions of Logs Using LLMs
Log data of all kinds store a wealth of information about benign and malicious identity and system behavior that are difficult for humans to understand. With examples drawn from AWS CloudTrail data, we will show practitioners how to leverage Large Language Models to mine log data and provide easily understandable, human-readable summaries of normal user session behavior as well as explain malicious activities.

Andromeda Security
Andromeda Security

AI Joins the Team II

June 05, 2024 12:00 - 12:20
Location: A 03-04
Too Many Hats, Too Little Time: Embracing AI for Professional Mastery
In this engaging and informative presentation, based on the principles outlined in "Too Many Hats, Too Little Time," attendees will explore innovative strategies for integrating generative AI into their professional lives. The talk is designed to demystify the process of leveraging AI personas—virtual executives like CEOs, CFOs, General Counsels, and CMOs—to enhance decision-making and task management. It offers a comprehensive roadmap for professionals at all levels, from those...

Vivander Advisors
June 05, 2024 12:20 - 12:40
Location: A 03-04
Igniting Innovation: Strategies for Fostering a High-Performance AI Startup within Your Enterprise
Discover the key strategies for nurturing a high-performance AI startup within the corporate structure of your enterprise. "Igniting Innovation" offers a roadmap to cultivating an environment that encourages agility, fosters creative thinking, and harnesses the potential of AI technologies. Learn how to blend the entrepreneurial spirit of a startup with the robust resources of an established enterprise, unlocking new avenues for growth, innovation, and competitive edge in the ever-evolving...

Vstorm.co
June 05, 2024 12:40 - 13:00
Location: A 03-04
AI Agents and Identity Wallets: Preserving Privacy in Data Sharing
AI agents will play a pivotal role in boosting productivity and quality of life for many people. However, AI agents are often hampered by the lack of necessary context to complete critical tasks. Sharing unrestricted access to personal data with an AI agent leads to serious privacy concerns. This presentation seeks to address these challenges by introducing a novel approach utilizing verifiable credentials and identity wallets to give an AI agent selective access to personal data in a...

Trinsic

Digital ID Deep Dives

B2B, CIAM, OAuth 2

June 05, 2024 14:30 - 14:50
Location: A 03-04
Business to Business (B2B) Delegated Client Authorisation Using OAuth 2.0
With the growing exposure of digital services and assets through application programming interfaces (APIs) and the emergence of the API Economy, entire business models are starting to be built around APIs. Increasingly, APIs are designed to be used externally as part of an organisation’s service delivery model. The adoption of the OAuth protocol has allowed consumer-to-business (C2B) integrations to authorise access to APIs in a standardised way. However, business-to-business (B2B)...

National Australia Bank
June 05, 2024 14:50 - 15:10
Location: A 03-04
B2B Identity: How the Companies of the HTI Group Took Digitalization to the Next Level
The companies of the HTI Group combine innovative solutions and sustainable products in the fields of winter sports technology, urban mobility, material transport, snow and vegetation management, as well as renewable energies. As developers and manufacturers, the companies of HTI are drivers of innovation and are active worldwide. Their products and solutions need to perform reliably and safely in remote areas, often under extreme environments. Operational excellence is core to the value that...

HTI Services
June 05, 2024 15:10 - 15:30
Location: A 03-04
Fostering Trust in Global Automotive Supply Chains Through DID and SSI
In a world that's becoming increasingly interconnected, establishing trust within global networks is both a critical challenge and a foundational necessity for successful collaboration and secure data exchange. The emergence of Self-Sovereign Identity (SSI) and Decentralized Identifiers (DID) has introduced new paradigms for digital identity that empower individuals and organizations with greater control and privacy while also ensuring interoperability and trust at scale. This talk delves...

Accenture

Wallet Security

June 05, 2024 15:30 - 15:50
Location: A 03-04
Wallet Security Mechanisms for the Decentralized Ecosystem
The concept of building trust relationships is an integral part of a decentralized ecosystem. A verifier must trust the identities of issuers to ensure the authenticity and integrity of data and a wallet must trust the identities of verifiers to ensure data is only sent to identified and authorized parties. The other important trust relationship is in the identity of the wallet and assures both issuer and verifier that they are communicating with a genuine, verified and unaltered wallet....

Bundesdruckerei GmbH
June 05, 2024 15:50 - 16:10
Location: A 03-04
The eIDAS 2.0 Era: Exploring the Security Landscape of Digital Identity Wallets
In the digital era, the security and privacy of personal and sensitive information have become a critical concern. Digital identity wallets have been introduced as a result of the new European regulation known as eIDAS 2.0. The digital identity wallet offers a practical and secure method for individuals to manage their personal data across various online platforms through a decentralized digital identity management model, without the reliance on centralized identity providers. However, since...

Fondazione Bruno Kessler (FBK)
Fondazione Bruno Kessler (FBK)
June 05, 2024 16:10 - 16:30
Location: A 03-04
The business Entity as an Authentic Source for Attributes
eIDAS version 2 introduces a new trust service that will significantly impact the identity landscape: the provisioning of attestations of attributes. Having attributes issued by a qualified trust provider will greatly enhance the reliability and availability of attributes required for business decisions. Businesses generate data about themselves and other natural and legal persons, and they are the authentic source of the attributes they generate. Hypervault (https://hypervault.com/) and...

Belgian Mobile ID

Authorization

June 05, 2024 17:30 - 17:50
Location: A 03-04
How AI Can Help IAM Deliver Better and Stronger Authorization
Whether you are excited about the possibilities of AI in your workplace or concerned about the overall privacy risks implementing the technology with a mind of its own - you can’t deny that AI is here to stay. It is bound to impact several facets of the world of access control and authorization. Take policies for instance: as humans, we seldom excel at implementing every single requirement into policy. Just typing in that employees are not able to access certain data in a time frame but...

Axiomatics AB
June 05, 2024 17:50 - 18:10
Location: A 03-04
Un-Complicate Authorization Maintenance
Every application at some point needs to tackle user permissions. It may be early for some systems or much later in others, but one thing for certain is that as soon as you have more than one user type, the logic will slowly evolve into spaghetti code. And then each time you need to update it will take longer and longer to complete.In this talk, we’ll proselytize about why decoupling authorization logic is the absolute best solution to the spaghetti code problem and other common...

Cerbos
June 05, 2024 18:10 - 18:30
Location: A 03-04
Panel: OpenID AuthZEN: Standards for Modern Authorization
Sign-on standards, such as SAML and OpenID Connect (OIDC), have paved the way for an interoperable identity fabric that has propelled the industry forward. It’s time for authorization to have its “OIDC moment.” Over the past few years, we’ve seen the rise of a new architectural pattern - externalizing authorization logic out of applications, and treating it as a separate concern. Google, Netflix, Airbnb, Carta, Intuit, and others have shared their experiences around...

Venn Factory
Axiomatics AB
Weave Identity
Aserto

Digital ID Deep Dives

Authentication Trends

June 06, 2024 11:00 - 11:15
Location: A 03-04
Finding the Right Passwordless Authentication Solution
Passwordless Authentication has become a popular and catchy term. The term Passwordless Authentication is used to describe a set of identity verification solutions that do not rely on passwords. In light of the security risks and inconvenience associated with password usage, we face a trend in which organizations are looking to replace and eliminate passwords entirely. Yet, finding a Passwordless Authentication solution that seamlessly combines simplicity, effectiveness, and security remains...

KuppingerCole
June 06, 2024 11:15 - 11:30
Location: A 03-04
Embracing the Password[less] Future
When it comes to your employees authenticating, multiple methods make for a complex tech stack. What if there were a simpler solution? One that could consolidate your tools while removing a login method that is largely reliant on human behaviour: Why businesses are looking to Passwordless authentication to secure their data. How & when they plan on implementing Passwordless technology (moving legacy into the future SSO, FIDO and Passkeys) The important role of passkeys in this...

LastPass
June 06, 2024 11:30 - 12:00
Location: A 03-04
Panel: Emerging Trends in Authentication Methods
As digital identity continues to evolve, so do the methods used to authenticate users. From passwordless approaches to cutting-edge biometrics, the authentication landscape is constantly changing. This panel brings together experts from various industries to explore the latest trends in authentication methods, discussing their strengths, weaknesses, and potential impact on security, user experience, and privacy. Gain insights into the future of authentication and discover strategies for...


Balancing Authentication & Privacy

June 06, 2024 12:00 - 12:20
Location: A 03-04
Open Wallet Foundation (OWF) Guide to Safe Digital Wallet Selection
Digital Wallets put the holder in control of their digital assets (e.g., identity information, financial instruments, other tokenized assets) and can provide a means to verify holder identity claims. Unless they are implemented carefully, they can open new vulnerabilities, or "back-doors" for undesirable surveillance, profiling, fraud, and the active correlation of users. Members of the Open Wallet Foundation (OWF) created a guide and an accompanying scoring template to provide a way for...

Microsoft
June 06, 2024 12:20 - 12:40
Location: A 03-04
Combining High Privacy, Security and Versatility, Tapping the [Q]eAA Potential for EUDI Wallet Payment Interactions
EUDI wallets will allow the storage and transfer to relying parties of Person Identification Data (PID) but also of electronically attested attributes (eAAs) that can play a critical role in securing digital interactions, both online and offline, especially when issued as qualified trust services (QEAAs). The presentation will consider the potential of atomic [Q]eAAs within the context of payment transactions and discuss in particular the role they could play for the purpose of combining...

Quali-Sign
SGM Consulting
June 06, 2024 12:40 - 13:00
Location: A 03-04
Scaling eIDAS 2.0 Wallets: The Secure Element Problem
The current approach for wallet and decentralized identities is not eIDAS 2.0 high compliant. In this talk we explore, what the current approaches are, what goes wrong and what we can do about it. After this session you will be a eIDAS 2.0 wallet expert.

Digital ID Deep Dives

Zero Trust Identity

June 06, 2024 14:30 - 14:45
Location: A 03-04
Zero Trust Network Access - Microsoft New Security Service Edge Solution
During this Session you will learn how Microsoft is closing gaps in the Zero Trust area and how SSE can help you to reduce operations and process capacities and heavily improve Security. Additional we look into a future without a VPN solution and see how this can be modernise.

Microsoft
June 06, 2024 14:45 - 15:00
Location: A 03-04
Automating Security Checks on AWS - A Deep Dive into Preventing Privilege Escalations
When moving to the Cloud, and especially AWS, common Identity Management functionality as found in on-premise tools have limited impact on securing your AWS environment, as many new types of access to a plethora of AWS resources for an overwhelming number of users need to be managed. Luckily, AWS provides a very detailed and granular model of roles and predefined policies to define who (or which entity) may be granted to access to which object. All done - right? Unfortunately, either through...

umbrella.associates GmbH
CodeShield
June 06, 2024 15:00 - 15:15
Location: A 03-04
Overcoming Passwords and Legacy: The Future of Customer Identity
The face of customer identity has changed completely over the years. While legacy systems such as password-based authentication and SAML continue to be present in the market, more modern specifications such as OpenID Connect and FIDO2 are quickly gaining ground and powering unique use cases that enterprises require today. In this session, Descope Co-Founder Meir Wahnon will: Highlight the changing customer identity needs facing today’s enterprises Share popular use cases of modern...

Descope
June 06, 2024 15:15 - 15:30
Location: A 03-04
From Shadow to Light: AI-Based Approach to Deal With Shadow Admins
In this talk, we will dive into a common headache for identity teams: shadow admins. These are users who, thanks to some mix-ups in permission settings, end up with admin powers they shouldn't have. The “traditional way” of dealing with shadow admins is mapping all of them and letting the identity team decide what to do with it. This approach can work only if the number of shadow admins is small, however, our research, that is based on data of more than 50 organizations, reveals...

Silverfort
Silverfort

Zero Knowledge; Verifiable Credentials; Sovrin

June 06, 2024 15:30 - 15:45
Location: A 03-04
The Use of Zero Knowledge in Self Sovereign Identities
In the same way Blockchain seems the best solution for a decentralized immutable to support decentralized identities, Zero Knowledge has become as the best technology to build privacy-by-default identity stacks. We will show how ZK can be use for enabling highly scalable and private identities, solving for multiple use cases and problems like: Proof of Credentials Private credential revocations DID methods that support Key Rotation Nullifiers for DID anti-tracking Proof of execution...

Polygon Labs
June 06, 2024 15:45 - 16:00
Location: A 03-04
Discover the Power of the Sovrin Ecosystem
Unleash the potential of decentralized solutions with Sovrin, a trusted foundation for secure and verifiable credentials. For over seven years, the Sovrin Foundation has provided a reliable, well-managed blockchain ledger, enabling innovative self-sovereign identity (SSI) solutions and decentralized trust. Governments, financial institutions, and stakeholders in highly regulated industries choose Sovrin for its open-source software, open standards, and governance model, ensuring...

Sovrin Foundation
June 06, 2024 16:00 - 16:15
Location: A 03-04
eIDAS2 Toolbox: Selective Disclosure and ZKP in the Identity Wallet
In this session, Sebastian Elfors gives an introduction into what selective disclosure really means for the EUDI Wallet within eIDAS2. He will delve into the topic of what selectively disclosed attributes are, unlinkability between relying parties, range proofs and zero-knowledge proof (ZKP) predicates. He will then dissect the legal definitions of “selective disclosure” within the eIDAS2 proposal as well as the technical definitions in the ARF outline. Next, different selective...

June 06, 2024 16:15 - 16:30
Location: A 03-04
eIDAS Certificates, PSD2, FIDO2 Passkeys & Everything at Once: eBay's Identity Journey in a Nutshell
eBay is a global marketplace that empowers hundreds of millions of buyers and sellers in more than 190 markets around the world, trading articles worth around 90 billion dollars every year. We provide new financial services to our sellers, such as keeping funds in the users' accounts for reusing them on eBay to purchase items or to buy shipping labels. In order to secure the accounts of our European sellers and to be compliant with the PSD2 regulation, eBay requires sellers in the EU and UK...


Investor Talks

June 06, 2024 17:30 - 17:50
Location: A 03-04
Embracing a Best in Class IAM Solution – the Investor Perspective
Investor appetite for high-impact identity security solutions remains strong, with superior product technology serving as the foundation for growth. As the shift from growth to value investing continues, companies are aligning go-to-market and product strategies for strong unit economics and steady profitable growth. With technological advancements and user demands constantly shifting, staying ahead in the identity security market hinges on an M&A strategy focused on the most...

June 06, 2024 17:50 - 18:10
Location: A 03-04
How VC Views Identity
Over the past 10 years identity startups have launched to the forefront across segments like wallets, ID Verification, fraud, cybersecurity. But how do investors evaluate identity focused startups? What are they looking for? This presentation will cover these topics from the perspective of an identity investor. 

Okta Ventures
Speedinvest
June 06, 2024 18:10 - 18:30
Location: A 03-04
Public Funding for Tech
Join our conference session for an insightful exploration of the vital role of public funding in driving advancements in AI, Digital ID, and Cybersecurity in Europe. Discover the landscape of grants and loans as indispensable tools propelling transformative progress in these cutting-edge fields! Within the European Union's expansive €13.5 billion EUR budget for research and innovation projects, our discussion aims to illuminate the significance of public financing in shaping the...

Grants Office Europe
Grants Office Europe

Digital ID Deep Dives

Tools & Engines Choice

June 07, 2024 10:30 - 10:50
Location: A 03-04
Build Your Own Authorization Server: Liberate Yourself From Vendor Limitations
In the fast-evolving landscape of digital connectivity, one of the biggest challenges service providers in highly regulated industries face today is ensuring that authentication and API authorization mechanisms are implemented correctly. At the same time, they are required to meet high expectations of customers for a seamless experience. Traditionally, authentication and API authorization functions have been combined into one system architecture, often through a managed service provided by a...

Authlete, Inc.
June 07, 2024 10:50 - 11:00
Location: A 03-04
Session Integrity Prevents Account Takeover (ATO) - One Step Closer to Continuous Authentication
Rainer Witzgall, Security Evangelist @Veridium, showcases how Veridium’s Identity Threat Protection A.I. is capable of protecting valid user sessions throughout the entire session, from the first authentication to the broader SSO-experience. Veridium utilizes its groundbreaking and patented identity threat protection technologies in connection with user authentication. Rainer is convinced: “This is where continuous authentication currently sits, its current state of...

Veridium
June 07, 2024 11:00 - 11:30
Location: A 03-04
Panel: Policy Engines in Practice
In this panel, we will host professionals from multiple industries who extensively use policy engines in their day-to-day jobs. We will hear from the end user's perspective what made them choose a particular policy engine over others and what important lessons they learned. We will try to focus on use cases over the basic engine functionality and provide an in-depth comparison that will help you identify the one that works best for you.

Axiomatics AB
EmpowerID
Identity Evangelist
Schneider Electric

Wallets, Authentication, OIDC

June 07, 2024 11:30 - 11:50
Location: A 03-04
Digital Wallet Holder Binding
Digital wallets are applications used to receive, store, and share identity attributes in a standards-based [preferably], secure, privacy enhancing fashion. To prove that the legitimate, natural person is receiving, in possession of, or sharing these identity attributes a means to bind them to the natural person is needed. In 1995, for example, the International Civil Aviation Organization (ICAO) clearly recognized the desirability of pursuing the use of biometrics in travel documents as the...

June 07, 2024 11:50 - 12:10
Location: A 03-04
Perspectives from 10 years of OpenID Connect
OpenID Connect became final in February 2014 and has since become ubiquitous.  Establishing new ecosystems is hard, and yet we achieved it with OpenID Connect.  This panel will explore how we created OpenID Connect, what we’ve achieved together, and lessons learned that are applicable to new identity systems and ecosystems under development today. Come join us and celebrate ten years of OpenID Connect!

Self-Issued Consulting
Yubico
OpenID Foundation
SPRIND - German Federal Agency for Disruptive Innovation
June 07, 2024 12:10 - 12:30
Location: A 03-04
Embracing Diverse Specifications – Abstracting for a Plurality of Markets With Multi Stack Solutions
Providing a product or service across markets internationally can come with significant technical and regulatory overhead. The challenge of such overhead might seem to reduce itself in the current market development in Europe with the soon to be standardized eIDAS architecture and unified wallet interaction protocols that seem to streamline identity integration requirements across 27 countries. In practice though, moving beyond the EU context will still require significant adaptation and...

Procivis AG

The Future of (C)IAM

June 07, 2024 13:30 - 14:00
Location: A 03-04
B2B Customer Identity & Access Management - Future Functional Requirements
In an era where digital interactions are central to business operations, the future of Customer Identity and Access Management (CIAM) is pivotal in shaping how businesses interact and secure trust with other businesses. This exclusive interview session, featuring Martin Kuppinger, Principal Analyst at KuppingerCole, alongside Maarten Stultjens and Marco Venuti from Thales Group, will focus on the question about future requirements of B2B CIAM and how the transformative potential of...

KuppingerCole
Thales
June 07, 2024 14:00 - 14:30
Location: A 03-04
The Future of Digital Identity in Enterprises and Beyond - What are your EIC24 Takeaways?
After an intense week of Digital ID talks and discussions at EIC 2024, this panel session will explore the transformation from traditional centralized systems to innovative decentralized identity solutions, which is ahead  inside and beyond the enterprise, underlining their increasing importance in enhancing security, ensuring privacy, and improving operational efficiency across industries. .

KuppingerCole
One Identity

Tools Choice

June 07, 2024 14:30 - 15:00
Location: A 03-04
PAM, CIEM, ITDR: What's the Difference and How to Choose Which is Right for Your Business
Choosing the right platform to secure identity access to privileged resources is more challenging. This is partly because of the escalating risk of under protected identities in the cloud and the tendency of bad actors to target those with privileged access. It’s also because the choice of tools has widened. The protection of privileged identities has traditionally fallen to PAM vendors such as CyberArk or BeyondTrust, but in the last few years, the space has widened to include CIEM and...

KuppingerCole
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch